Compare commits

...

9 Commits
0.2 ... main

Author SHA1 Message Date
a29f511550 Merge branch 'dev' 2025-04-22 12:18:35 +02:00
fe92030438 Default route handling for IPv6 conversion 2025-04-22 12:17:59 +02:00
80ee221226 Merge branch 'dev' 2023-04-12 20:00:16 +02:00
9b0ed5a51b go-format 2023-04-12 19:58:51 +02:00
0d6564448a Make faulture to add address fatal 2023-04-12 19:58:39 +02:00
ba6342a71f Move IP-conversion into loop 2023-04-12 19:57:57 +02:00
631b1bf12e Fix spelling 2023-04-12 19:50:41 +02:00
1ca4bd87b8 Merge branch 'dev' 2023-04-11 11:46:54 +02:00
f8c7493e0d Fix missing time-unit 2023-04-11 11:46:47 +02:00
2 changed files with 131 additions and 120 deletions

View File

@ -24,6 +24,8 @@ The program will convert IPv4-only wireguard-interfaces to IPv6. It converts and
IPv6-Adresses are generated based on the IPv4-Adress. IPv6-Adresses are generated based on the IPv4-Adress.
If not filtered out, then default routes (0.0.0.0/0) are handled specially and are converted to the IPv6 default route (::/0).
Beware: This program needs `NET_ADMIN` privileges for setting Adresses and to access the wireguard-daemon. Beware: This program needs `NET_ADMIN` privileges for setting Adresses and to access the wireguard-daemon.
<br> <br>
@ -82,7 +84,7 @@ Restart=always
RestartSec=30 RestartSec=30
Environment="INTERFACE=wt0" Environment="INTERFACE=wt0"
Environment="RECHECK_INTERVAL=60" Environment="RECHECK_INTERVAL=60s"
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target

View File

@ -7,7 +7,7 @@ import (
"time" "time"
envChecks "git.ruekov.eu/ruakij/routingtabletowg/lib/environmentchecks" envChecks "git.ruekov.eu/ruakij/routingtabletowg/lib/environmentchecks"
"git.ruekov.eu/ruakij/routingtabletowg/lib/wgchecks/netchecks" "git.ruekov.eu/ruakij/routingtabletowg/lib/wgchecks/netchecks"
"github.com/vishvananda/netlink" "github.com/vishvananda/netlink"
"golang.zx2c4.com/wireguard/wgctrl" "golang.zx2c4.com/wireguard/wgctrl"
@ -17,153 +17,162 @@ import (
var envRequired = []string{ var envRequired = []string{
"INTERFACE", "INTERFACE",
} }
var envDefaults = map[string]string{ var envDefaults = map[string]string{
"IPV6_FORMAT": "fc12::%02x%02x:%02x%02x/%d", "IPV6_FORMAT": "fc12::%02x%02x:%02x%02x/%d",
"FILTER_PREFIX": "100.100", "FILTER_PREFIX": "100.100",
"RECHECK_INTERVAL": "5m", "RECHECK_INTERVAL": "5m",
} }
func main() { func main() {
// Environment-vars // Environment-vars
err := envChecks.HandleRequired(envRequired) err := envChecks.HandleRequired(envRequired)
if(err != nil){ if err != nil {
logger.Error.Fatal(err) logger.Error.Fatal(err)
} }
envChecks.HandleDefaults(envDefaults) envChecks.HandleDefaults(envDefaults)
// Get the network interface object // Get the network interface object
iface := os.Getenv("INTERFACE") iface := os.Getenv("INTERFACE")
netInterface, err := netlink.LinkByName(iface) netInterface, err := netlink.LinkByName(iface)
if err != nil { if err != nil {
logger.Error.Fatal(err) logger.Error.Fatal(err)
} }
ipv6Format := os.Getenv("IPV6_FORMAT") ipv6Format := os.Getenv("IPV6_FORMAT")
ipv6TestStr := *convertIPv4ToIPv6(&ipv6Format, &net.IPNet{IP: net.IPv4(1,1,1,1), Mask: net.CIDRMask(24, net.IPv4len)}) ipv6TestStr := *convertIPv4ToIPv6(&ipv6Format, &net.IPNet{IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, net.IPv4len)})
_, err = netlink.ParseIPNet(ipv6TestStr) _, err = netlink.ParseIPNet(ipv6TestStr)
if err != nil { if err != nil {
logger.Error.Fatalf("IPV6_FORMAT is invalid: %s", err) logger.Error.Fatalf("IPV6_FORMAT is invalid: %s", err)
} }
filterPrefix := os.Getenv("FILTER_PREFIX") filterPrefix := os.Getenv("FILTER_PREFIX")
checkIntervalStr := os.Getenv("RECHECK_INTERVAL") checkIntervalStr := os.Getenv("RECHECK_INTERVAL")
checkInterval, err := time.ParseDuration(checkIntervalStr) checkInterval, err := time.ParseDuration(checkIntervalStr)
if err != nil { if err != nil {
logger.Error.Fatalf("Couldn't parse RECHECK_INTERVAL '%s': %s", checkIntervalStr, err) logger.Error.Fatalf("Couldn't parse RECHECK_INTERVAL '%s': %s", checkIntervalStr, err)
} }
// Get the IPv4 address of the interface // Create a WireGuard client
addrs, err := netlink.AddrList(netInterface, netlink.FAMILY_V4) client, err := wgctrl.New()
if err != nil { if err != nil {
logger.Error.Fatal(err) logger.Error.Fatal(err)
} }
processedCount := 0 defer client.Close()
filteredCount := 0
for _, addr := range addrs {
// Check filter
if addr.String()[:len(filterPrefix)] != filterPrefix {
filteredCount++
continue
}
// Add the IPv6 address to the interface // Loop indefinitely
ipv6Str := *convertIPv4ToIPv6(&ipv6Format, addr.IPNet) for {
ipv6, err := netlink.ParseAddr(ipv6Str) // Get the IPv4 addresses of the interface
if err != nil { addrs, err := netlink.AddrList(netInterface, netlink.FAMILY_V4)
logger.Warn.Printf("failed parsing converted %s -> %s : %s", addr.IPNet.String(), ipv6Str, err) if err != nil {
continue logger.Error.Fatal(err)
} }
processedCount := 0
filteredCount := 0
for _, addr := range addrs {
// Check filter
if addr.String()[:len(filterPrefix)] != filterPrefix {
filteredCount++
continue
}
logger.Info.Printf("Adding converted %s -> %s to interface", addr.IPNet.String(), ipv6Str) // Add the IPv6 address to the interface
err = netlink.AddrAdd(netInterface, ipv6) ipv6Str := *convertIPv4ToIPv6(&ipv6Format, addr.IPNet)
if err != nil { ipv6, err := netlink.ParseAddr(ipv6Str)
switch { if err != nil {
case os.IsExist(err): logger.Warn.Printf("failed parsing converted %s -> %s : %s", addr.IPNet.String(), ipv6Str, err)
logger.Warn.Println("Address is already set on interface") continue
default: }
logger.Warn.Printf("Failed to set address on interface: %v", err)
}
}
processedCount++
}
if(processedCount != len(addrs)) {
logger.Warn.Printf("Not all Interface-Addresses were processed. Summary: %d processed, %d filtered, %d failed", processedCount, filteredCount, len(addrs)-processedCount-filteredCount)
}
// Create a WireGuard client logger.Info.Printf("Adding converted %s -> %s to interface", addr.IPNet.String(), ipv6Str)
client, err := wgctrl.New() err = netlink.AddrAdd(netInterface, ipv6)
if err != nil { if err != nil {
logger.Error.Fatal(err) switch {
} case os.IsExist(err):
defer client.Close() logger.Warn.Println("Address is already set on interface")
default:
logger.Error.Fatalf("Failed to set address on interface: %v", err)
}
}
processedCount++
}
if processedCount != len(addrs) {
logger.Warn.Printf("Not all Interface-Addresses were processed. Summary: %d processed, %d filtered, %d failed", processedCount, filteredCount, len(addrs)-processedCount-filteredCount)
}
// Loop indefinitely // Get the WireGuard peers on the interface
for { wgDevice, err := client.Device(iface)
// Get the WireGuard peers on the interface if err != nil {
wgDevice, err := client.Device(iface) logger.Error.Fatalf("getting WireGuard device from interface '%s' failed: %s", iface, err)
if err != nil { }
logger.Error.Fatalf("getting WireGuard device from interface '%s' failed: %s", iface, err)
}
var wgConfig wgtypes.Config var wgConfig wgtypes.Config
wgConfig.Peers = make([]wgtypes.PeerConfig, 0, len(wgDevice.Peers)) wgConfig.Peers = make([]wgtypes.PeerConfig, 0, len(wgDevice.Peers))
for _, peer := range wgDevice.Peers { for _, peer := range wgDevice.Peers {
// Create slice for 1 expected addition // Create slice for 1 expected addition
var addAllowedIPs = make([]net.IPNet, 0, 1) addAllowedIPs := make([]net.IPNet, 0, 1)
// Loop through the allowed-ips and add the ones starting with 100.100 // Loop through the allowed-ips and add the ones starting with 100.100
for _, allowedIP := range peer.AllowedIPs { for _, allowedIP := range peer.AllowedIPs {
if allowedIP.String()[:len(filterPrefix)] == filterPrefix { if allowedIP.String()[:len(filterPrefix)] == filterPrefix {
// Convert the IPv4 allowed-ip to an IPv6 address // Convert the IPv4 allowed-ip to an IPv6 address
ipv6Str := *convertIPv4ToIPv6(&ipv6Format, &allowedIP) ipv6Str := *convertIPv4ToIPv6(&ipv6Format, &allowedIP)
logger.Info.Printf("AllowedIP %s -> %s to peer %s", allowedIP.String(), ipv6Str, peer.PublicKey) logger.Info.Printf("AllowedIP %s -> %s to peer %s", allowedIP.String(), ipv6Str, peer.PublicKey)
ipv6, err := netlink.ParseIPNet(ipv6Str) ipv6, err := netlink.ParseIPNet(ipv6Str)
if err != nil { if err != nil {
logger.Warn.Printf("Couldnt parse IPv6 address %s of peer %s: %s", ipv6Str, peer.PublicKey, err) logger.Warn.Printf("Couldnt parse IPv6 address %s of peer %s: %s", ipv6Str, peer.PublicKey, err)
continue continue
} }
// Check if already set // Check if already set
if i, _ := netchecks.IPNetIndexByIPNet(&peer.AllowedIPs, ipv6); i != -1 { if i, _ := netchecks.IPNetIndexByIPNet(&peer.AllowedIPs, ipv6); i != -1 {
continue continue
} }
// Add the IPv6 allowed-ip to the peer // Add the IPv6 allowed-ip to the peer
addAllowedIPs = append(addAllowedIPs, *ipv6) addAllowedIPs = append(addAllowedIPs, *ipv6)
} }
} }
if(len(addAllowedIPs) > 0){ if len(addAllowedIPs) > 0 {
// Create peer-config // Create peer-config
peerConfig := wgtypes.PeerConfig{ peerConfig := wgtypes.PeerConfig{
PublicKey: peer.PublicKey, PublicKey: peer.PublicKey,
AllowedIPs: append(peer.AllowedIPs, addAllowedIPs...), AllowedIPs: append(peer.AllowedIPs, addAllowedIPs...),
} }
// Add entry // Add entry
wgConfig.Peers = append(wgConfig.Peers, peerConfig) wgConfig.Peers = append(wgConfig.Peers, peerConfig)
} }
} }
if(len(wgConfig.Peers) == 0){ if len(wgConfig.Peers) == 0 {
logger.Info.Println("No changes, skipping") logger.Info.Println("No changes, skipping")
} else { } else {
err = client.ConfigureDevice(iface, wgConfig) err = client.ConfigureDevice(iface, wgConfig)
if(err != nil){ if err != nil {
logger.Error.Fatalf("Error configuring wg-device '%s': %s", iface, err) logger.Error.Fatalf("Error configuring wg-device '%s': %s", iface, err)
} }
} }
// Sleep for x seconds before running the loop again // Sleep for x seconds before running the loop again
time.Sleep(checkInterval) time.Sleep(checkInterval)
} }
} }
func convertIPv4ToIPv6(ipv6Format *string, ipv4 *net.IPNet) (*string) { func convertIPv4ToIPv6(ipv6Format *string, ipv4 *net.IPNet) *string {
CIDR, _ := ipv4.Mask.Size() // Check if this is a default route (0.0.0.0/0)
// Run format if ipv4.IP.Equal(net.IPv4zero) {
ipv6Str := fmt.Sprintf(*ipv6Format, (*ipv4).IP[0], (*ipv4).IP[1], (*ipv4).IP[2], (*ipv4).IP[3], net.IPv6len*8-(net.IPv4len*8-CIDR)) if ones, _ := ipv4.Mask.Size(); ones == 0 {
return &ipv6Str defaultRoute := "::/0"
return &defaultRoute
}
}
CIDR, _ := ipv4.Mask.Size()
// Run format
ipv6Str := fmt.Sprintf(*ipv6Format, (*ipv4).IP[0], (*ipv4).IP[1], (*ipv4).IP[2], (*ipv4).IP[3], net.IPv6len*8-(net.IPv4len*8-CIDR))
return &ipv6Str
} }